Skip to main content

2024 | OriginalPaper | Buchkapitel

Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack

verfasst von : Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu

Erschienen in: ICT Systems Security and Privacy Protection

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The video platforms that users watch leak the privacy of their preferences. More and more video streaming is being encrypted to protect users’ privacy. In addition, many users use VPN to enhance their privacy protection further. VPN makes video platform identification challenging because it poses traffic obfuscation and further data encryption. Although the segment-based transmission mechanism and Variable Bit-Rate encoding in HAS make network video traffic show still identifiable patterns, most existing work cannot distinguish different platforms due to the similarity of video streaming. Therefore, we propose a traffic-based side-channel attack method to identify VPN video streaming platforms in real time. The aggregated feature sequence of the unidirectional video streaming is extracted to significantly retain the characteristics of different video platforms. Experiments on 10Gbps backbone background traffic show that the F1-score of the method exceeds 97% and can be processed in real time. In addition, we verify the method’s robustness on datasets with different path features and encryption techniques. A comparison with similar methods shows that our method only requires 1/1260 of the storage and 1/60 of the processing time to identify accurately.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Afuwape, A.A., Xu, Y., Anajemba, J.H., Srivastava, G.: Performance evaluation of secured network traffic classification using a machine learning approach. Comput. Stand. Interfaces 78, 103545 (2021)CrossRef Afuwape, A.A., Xu, Y., Anajemba, J.H., Srivastava, G.: Performance evaluation of secured network traffic classification using a machine learning approach. Comput. Stand. Interfaces 78, 103545 (2021)CrossRef
2.
Zurück zum Zitat Akhshabi, S., Anantakrishnan, L., Begen, A.C., Dovrolis, C.: What happens when http adaptive streaming players compete for bandwidth? In: Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 9–14 (2012) Akhshabi, S., Anantakrishnan, L., Begen, A.C., Dovrolis, C.: What happens when http adaptive streaming players compete for bandwidth? In: Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 9–14 (2012)
3.
Zurück zum Zitat Barradas, D., Santos, N., Rodrigues, L.: Effective detection of multimedia protocol tunneling using machine learning. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 18), pp. 169–185 (2018) Barradas, D., Santos, N., Rodrigues, L.: Effective detection of multimedia protocol tunneling using machine learning. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 18), pp. 169–185 (2018)
4.
Zurück zum Zitat Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp. 191–206. IEEE (2010) Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy, pp. 191–206. IEEE (2010)
5.
Zurück zum Zitat Cho, K.: Km, and kato, a. traffic data repository at the wide project. USENIX ATC, Freenix track (2000) Cho, K.: Km, and kato, a. traffic data repository at the wide project. USENIX ATC, Freenix track (2000)
7.
Zurück zum Zitat Dias, K.L., Pongelupe, M.A., Caminhas, W.M., de Errico, L.: An innovative approach for real-time network traffic classification. Comput. Netw. 158, 143–157 (2019)CrossRef Dias, K.L., Pongelupe, M.A., Caminhas, W.M., de Errico, L.: An innovative approach for real-time network traffic classification. Comput. Netw. 158, 143–157 (2019)CrossRef
8.
Zurück zum Zitat Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414 (2016) Draper-Gil, G., Lashkari, A.H., Mamun, M.S.I., Ghorbani, A.A.: Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), pp. 407–414 (2016)
9.
Zurück zum Zitat Esteban, J., Benno, S.A., Beck, A., Guo, Y., Hilt, V., Rimac, I.: Interactions between http adaptive streaming and TCP. In: Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 21–26 (2012) Esteban, J., Benno, S.A., Beck, A., Guo, Y., Hilt, V., Rimac, I.: Interactions between http adaptive streaming and TCP. In: Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 21–26 (2012)
10.
Zurück zum Zitat Izadi, S., Ahmadi, M., Rajabzadeh, A.: Network traffic classification using deep learning networks and Bayesian data fusion. J. Netw. Syst. Manage. 30(2), 25 (2022)CrossRef Izadi, S., Ahmadi, M., Rajabzadeh, A.: Network traffic classification using deep learning networks and Bayesian data fusion. J. Netw. Syst. Manage. 30(2), 25 (2022)CrossRef
11.
Zurück zum Zitat Khan, M.U., Bukhari, S.M., Maqsood, T., Fayyaz, M.A., Dancey, D., Nawaz, R.: SCNN-attack: a side-channel attack to identify youtube videos in a VPN and non-VPN network traffic. Electronics 11(3), 350 (2022)CrossRef Khan, M.U., Bukhari, S.M., Maqsood, T., Fayyaz, M.A., Dancey, D., Nawaz, R.: SCNN-attack: a side-channel attack to identify youtube videos in a VPN and non-VPN network traffic. Electronics 11(3), 350 (2022)CrossRef
12.
Zurück zum Zitat Mangla, T., Halepovic, E., Ammar, M., Zegura, E.: Using session modeling to estimate HTTP-based video QoE metrics from encrypted network traffic. IEEE Trans. Netw. Serv. Manage. 16(3), 1086–1099 (2019)CrossRef Mangla, T., Halepovic, E., Ammar, M., Zegura, E.: Using session modeling to estimate HTTP-based video QoE metrics from encrypted network traffic. IEEE Trans. Netw. Serv. Manage. 16(3), 1086–1099 (2019)CrossRef
13.
Zurück zum Zitat Pacheco, F., Exposito, E., Gineste, M.: A framework to classify heterogeneous internet traffic with machine learning and deep learning techniques for satellite communications. Comput. Netw. 173, 107213 (2020)CrossRef Pacheco, F., Exposito, E., Gineste, M.: A framework to classify heterogeneous internet traffic with machine learning and deep learning techniques for satellite communications. Comput. Netw. 173, 107213 (2020)CrossRef
14.
Zurück zum Zitat Shapira, T., Shavitt, Y.: FlowPic: a generic representation for encrypted traffic classification and applications identification. IEEE Trans. Netw. Serv. Manage. 18(2), 1218–1232 (2021)CrossRef Shapira, T., Shavitt, Y.: FlowPic: a generic representation for encrypted traffic classification and applications identification. IEEE Trans. Netw. Serv. Manage. 18(2), 1218–1232 (2021)CrossRef
15.
Zurück zum Zitat Shi, Y., Ross, A., Biswas, S.: Source identification of encrypted video traffic in the presence of heterogeneous network traffic. Comput. Commun. 129, 101–110 (2018)CrossRef Shi, Y., Ross, A., Biswas, S.: Source identification of encrypted video traffic in the presence of heterogeneous network traffic. Comput. Commun. 129, 101–110 (2018)CrossRef
16.
Zurück zum Zitat Stanton, R.: Securing VPNs: comparing SSL and IPSEC. Comput. Fraud Secur. 2005(9), 17–19 (2005)CrossRef Stanton, R.: Securing VPNs: comparing SSL and IPSEC. Comput. Fraud Secur. 2005(9), 17–19 (2005)CrossRef
18.
Zurück zum Zitat Tang, P., Dong, Y., Mao, S.: Online traffic classification using granules. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1135–1140. IEEE (2020) Tang, P., Dong, Y., Mao, S.: Online traffic classification using granules. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1135–1140. IEEE (2020)
Metadaten
Titel
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack
verfasst von
Anting Lu
Hua Wu
Hao Luo
Guang Cheng
Xiaoyan Hu
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-56326-3_24

Premium Partner